Skip to main content

Advertisement

SpringerLink
  • Log in
Book cover

Workshop on the Theory and Application of of Cryptographic Techniques

EUROCRYPT 1989: Advances in Cryptology — EUROCRYPT ’89 pp 29–37Cite as

  1. Home
  2. Advances in Cryptology — EUROCRYPT ’89
  3. Conference paper
An Identity-Based Key-Exchange Protocol

An Identity-Based Key-Exchange Protocol

  • Christoph G. Günther3 
  • Conference paper
  • First Online: 01 January 2001
  • 4720 Accesses

  • 110 Citations

  • 3 Altmetric

Part of the Lecture Notes in Computer Science book series (LNCS,volume 434)

Abstract

The distribution of cryptographic keys has always been a major problem in applications with many users. Solutions were found for closed user groups and small open systems. These are, however, not efficient for large networks. We propose an identity-based approach to that problem which is simple and applicable to networks of arbitrary size. With the solution proposed, the user group can, furthermore, be extended at will. Each new user needs only to visit a key authentication center (KAC) once and is from then on able to exchange authenticated keys with each other user of the network. We expect this type of approach, which was originally conceived for authentication and signatures, to play an increasing role in the solution of all types of key distribution problems.

Download conference paper PDF

References

  1. W. Diffie, M.E. Hellman, “New Directions in Cryptography,” IEEE Trans. on Inform. Theory, vol. IT-22, pp. 644–654, Nov. 1976.

    CrossRef  MathSciNet  Google Scholar 

  2. T. El-Gamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans. on Inform. Theory, vol. IT-31, pp. 469–472, July 1985.

    CrossRef  MathSciNet  Google Scholar 

  3. R.L. Rivest, A. Shamir, L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, vol. 21, pp. 120–126, Feb. 1978.

    CrossRef  MATH  MathSciNet  Google Scholar 

  4. A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Advances in Cryptology-CRYPTO’84, Lect. Notes in Computer Science, vol. 196, pp. 47–53, Springer-Verlag (1985).

    Google Scholar 

  5. S. Goldwasser, S. Micali, C. Rackoff, “The Knowledge Complexity of Interactive Proof Systems,” SIAM J. Comput., vol. 18, pp. 186–208, Feb. 1989.

    CrossRef  MATH  MathSciNet  Google Scholar 

  6. U. Feige, A. Fiat, A. Shamir, “Zero-Knowledge Proofs of Identity,” J. of Cryptology, vol. 1, pp. 77–94, 1988.

    CrossRef  MATH  MathSciNet  Google Scholar 

  7. A. Fiat, A. Shamir, “How to Prove Yourself: Practical Solutions to Identification and Signature Problems,” Advances in Cryptology-CRYPTO’86, Lect. Notes in Computer Science, vol. 263, pp. 186–194, Springer-Verlag (1987).

    Google Scholar 

  8. T. Beth, “Efficient Zero-Knowledge Identification Scheme for Smart Cards,” Advances in Cryptology-EUROCRYPT’88, Lect. Notes in Computer Science, vol. 330, pp. 77–84, Springer-Verlag (1988).

    Google Scholar 

  9. L.C. Guillou, J.-J. Quisquater, “A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory,” Advances in Cryptology-EUROCRYPT’88, Lect. Notes in Computer Science, vol. 330, pp. 123–128, Springer-Verlag (1988).

    Google Scholar 

  10. D. Chaum, J.-H. Evertse, J. van de Graaf, “An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations,” Advances in Cryptology-EUROCRYPT’87, Lect. Notes in Computer Science, vol. 304, pp. 127–141, Springer-Verlag (1988).

    Google Scholar 

  11. F. Bauspieß, H.-J. Knobloch, “How to Keep Authenticity Alive in a Computer Network,” Advances in Cryptology-EUROCRYPT’89, Lect. Notes in Computer Science, this issue, Springer Verlag.

    Google Scholar 

  12. E. Okamoto, K. Tanaka, “Key Distribution System Based on Identification Information,” IEEE J. Select. Areas Commun., vol. SAC-7, pp. 481–485, May 1989.

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Asea Brown Boveri, Corporate Research, CH-5405, Baden, Switzerland

    Christoph G. Günther

Authors
  1. Christoph G. Günther
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Philips Research Laboratory, Avenue Albert Einstein 4, B-1348, Louvain-la-Neuve, Belgium

    Jean-Jacques Quisquater

  2. ESAT Laboratory, Katholieke Universiteit Leuven, Kardinaal Mercierlaan 94, B-3001, Heverlee, Belgium

    Joos Vandewalle

Rights and permissions

Reprints and Permissions

Copyright information

© 1990 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Günther, C.G. (1990). An Identity-Based Key-Exchange Protocol. In: Quisquater, JJ., Vandewalle, J. (eds) Advances in Cryptology — EUROCRYPT ’89. EUROCRYPT 1989. Lecture Notes in Computer Science, vol 434. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46885-4_5

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/3-540-46885-4_5

  • Published: 18 May 2001

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-53433-4

  • Online ISBN: 978-3-540-46885-1

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Over 10 million scientific documents at your fingertips

Switch Edition
  • Academic Edition
  • Corporate Edition
  • Home
  • Impressum
  • Legal information
  • Privacy statement
  • California Privacy Statement
  • How we use cookies
  • Manage cookies/Do not sell my data
  • Accessibility
  • FAQ
  • Contact us
  • Affiliate program

Not logged in - 3.226.122.122

Not affiliated

Springer Nature

© 2023 Springer Nature Switzerland AG. Part of Springer Nature.